Home / MCP / MalwareAnalyzerMCP Server
Provides terminal command execution and malware analysis tools for Claude Desktop within a dedicated MCP server.
Configuration
View docs{
"mcpServers": {
"malware_analysis_mcp": {
"command": "node",
"args": [
"/path/to/MalwareAnalysisMCP/index.js"
]
}
}
}You run MalwareAnalyzerMCP to execute terminal commands for malware analysis from a Claude Desktop client. It exposes specialized tools, clean process handling, and a straightforward way to read command output and interact with running processes, all implemented in pure JavaScript with no build step required.
To use MalwareAnalyzerMCP from Claude Desktop, you connect your client to the MCP server configuration you set up on your machine. You can start the server directly, use an npm script, or route all communications through a debugging proxy to see every message.
Starting options you can use:
node index.jsnpm startnpm run debugConfigure Claude Desktop to connect to MalwareAnalyzerMCP by adding a server entry that launches the MCP runner. The example below shows how to point Claude Desktop at a local server instance.
{
"mcpServers": {
"MalwareAnalysisMCP": {
"command": "node",
"args": [
"/path/to/MalwareAnalysisMCP/index.js"
]
}
}
}If you want to inspect all communications between Claude Desktop and the MCP server, run the debug proxy and point Claude Desktop at it. This is useful for troubleshooting and verifying that messages are flowing correctly.
{
"mcpServers": {
"MalwareAnalysisMCP": {
"command": "node",
"args": [
"/path/to/MalwareAnalysisMCP/mcp-debug-proxy.js"
]
}
}
}Executes a terminal command and returns its process ID, output, and blocked status.
Reads output from a running or completed process.
Analyze a file and determine its type.
Extract printable strings from a file.
Display file contents in hexadecimal format.
Display information from object files.
Create a hexdump with ASCII representation.